Sunday, May 18, 2025
HomeCyber AttackHackers Use Pahalgam Attack-Themed Decoys to Target Indian Government Officials

Hackers Use Pahalgam Attack-Themed Decoys to Target Indian Government Officials

Published on

SIEM as a Service

Follow Us on Google News

The Seqrite Labs APT team has uncovered a sophisticated cyber campaign by the Pakistan-linked Transparent Tribe (APT36) targeting Indian Government and Defense personnel.

This operation, centered around the recent Pahalgam terror attack on April 22, 2025, leverages emotionally charged themes to distribute phishing documents and deploy malicious payloads.

Exploiting Geopolitical Tensions for Cyber Espionage

The attackers have crafted deceptive PDFs and domains mimicking official entities like the Jammu & Kashmir Police and the Indian Air Force (IAF), created just days after the attack, to lure victims into credential theft and malware infection.

- Advertisement - Google News
Pahalgam Attack
PDF in question

The phishing campaign employs meticulously designed PDFs, such as “Action Points & Response by Govt Regarding Pahalgam Terror Attack.pdf,” created on April 24, 2025, under the alias “Kalu Badshah.”

Crimson RAT and Phishing Infrastructure Unmasked

These documents embed malicious links redirecting users to fake login pages hosted on spoofed domains like hxxps://jkpolice[.]gov[.]in[.]kashmirattack[.]exposed, which imitates the official Jammu & Kashmir Police website.

Upon entering credentials-often targeting @gov.in or @nic.in accounts-the data is siphoned directly to the attackers.

Additionally, a PowerPoint add-on file (PPAM) named “Report & Update Regarding Pahalgam Terror Attack.ppam” contains malicious macros that drop the notorious Crimson RAT.

Pahalgam Attack
PowerPoint PPAM Dropper

This remote access trojan, compiled just before the attack on April 21, 2025, is disguised as “WEISTT.jpg” and connects to a command-and-control (C2) server at 93.127.133[.]58.

Crimson RAT supports 22 commands, enabling attackers to capture screenshots, exfiltrate files, and execute malicious code, posing a severe threat to sensitive operations.

The infrastructure behind this campaign reveals a pattern of rapid domain registration post-attack, with phishing domains like iaf[.]nic[.]in[.]ministryofdefenceindia[.]org created as early as April 16, 2025.

These domains, hosted across multiple ASNs such as AS 200019 (Alexhost Srl) and AS 213373 (IP Connect Inc), are consistent with APT36’s long-standing tactics of targeting Indian military and government entities.

The use of geopolitical themes like the Kashmir conflict amplifies the psychological impact, aiming to disrupt operations, steal intelligence, and potentially spread disinformation.

If successful, such attacks could compromise national security by exposing sensitive data or enabling deeper network infiltration.

According to the Report, Seqrite Labs recommends robust countermeasures, including advanced email and document screening, disabling macros by default, and integrating geopolitical threat intelligence to preempt such targeted campaigns.

User awareness training and behavioral analytics to detect anomalies are also critical to mitigate risks.

This campaign underscores the intersection of cybersecurity and geopolitics, highlighting how nation-state actors exploit real-world events for digital warfare.

Indicators of Compromise (IOCs)

CategoryIndicator
Phishing Documentsc4fb60217e3d43eac92074c45228506a, 172fff2634545cf59d59c179d139e0aa (examples)
Phishing Domainsjkpolice[.]gov[.]in[.]kashmirattack[.]exposed, iaf[.]nic[.]in[.]ministryofdefenceindia[.]org
Phishing URLshxxps://jkpolice[.]gov[.]in[.]kashmirattack[.]exposed/service/home/ (example)
PPAM/XLAMd946e3e94fec670f9e47aca186ecaabe (example)
Crimson RAT026e8e7acb2f2a156f8afff64fd54066 (example), IP: 93.127.133.58 (Ports: 1097, etc.)

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...